Reply to post: @bombastic bob

3 is the magic number (of bits): Flip 'em at once and your ECC protection can be Rowhammer'd

Anonymous Coward
Anonymous Coward

@bombastic bob

There are only a handful of viable VM technologies they could possibly use. You've got ESX, Hyper-V, and Xen, that's about it. The type of attack you'd use against each would be different, but you could try all three - though realistically it probably isn't hard to figure out what technology a particular cloud provider uses. Just check their job listings and see what skills they are looking for.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon